<?xml version="1.0" encoding="UTF-8"?>
<!--PATCHINFO id="8cb28f685e1443f37a38c6b45f183d74"!-->
<patch
    xmlns="http://novell.com/package/metadata/suse/patch"
    xmlns:yum="http://linux.duke.edu/metadata/common"
    xmlns:rpm="http://linux.duke.edu/metadata/rpm"
    xmlns:suse="http://novell.com/package/metadata/suse/common"
    patchid="acroread-6332"
    timestamp="1246433748"
    engine="1.0">
  <yum:name>acroread</yum:name>
  <summary lang="en">acroread: Fix various security issues</summary>
  <summary lang="de">acroread: Fix various security issues</summary>
  <description lang="en">This update of acroread fixes the following vulnerabilities:
- CVE-2009-1855: stack overflow that could lead to code
  execution
- CVE-2009-1856: integer overflow with potential to lead to
  arbitrary code execution
- CVE-2009-1857: memory corruption with potential to lead
  to arbitrary code execution
- CVE-2009-1858: memory corruption with potential to lead
  to arbitrary code execution
- CVE-2009-1859: memory corruption with potential to lead
  to arbitrary code execution
- CVE-2009-0198: memory corruption with potential to lead
  to arbitrary code execution
- CVE-2009-0509, CVE-2009-0510 CVE-2009-0511,
  CVE-2009-0512:  heap overflow that could lead to code
  execution
- CVE-2009-1861: heap overflow that could lead to code
  execution
</description>
  <description lang="de">This update of acroread fixes the following vulnerabilities:
- CVE-2009-1855: stack overflow that could lead to code
  execution
- CVE-2009-1856: integer overflow with potential to lead to
  arbitrary code execution
- CVE-2009-1857: memory corruption with potential to lead
  to arbitrary code execution
- CVE-2009-1858: memory corruption with potential to lead
  to arbitrary code execution
- CVE-2009-1859: memory corruption with potential to lead
  to arbitrary code execution
- CVE-2009-0198: memory corruption with potential to lead
  to arbitrary code execution
- CVE-2009-0509, CVE-2009-0510 CVE-2009-0511,
  CVE-2009-0512:  heap overflow that could lead to code
  execution
- CVE-2009-1861: heap overflow that could lead to code
  execution
</description>
  <yum:version ver="6332" rel="0"/>
  <rpm:requires>
    <rpm:entry kind="atom" name="acroread" epoch="0" ver="8.1.6" rel="0.1" flags="EQ"/>
  </rpm:requires>
  <category>security</category>
  <atoms>
    <package xmlns="http://linux.duke.edu/metadata/common" type="rpm">
      <name>acroread</name>
      <arch>i586</arch>
      <version epoch="0" ver="8.1.6" rel="0.1"/>
      <checksum type="sha" pkgid="YES">62ea3ca692760430e9e42fc8f4d44b1e049c8d44</checksum>
      <time file="1246442628" build="1246433748"/>
      <size package="46512916" installed="119036769" archive="119194248"/>
      <location href="rpm/i586/acroread-8.1.6-0.1.i586.rpm"/>
      <format>
        <rpm:requires>
          <rpm:entry kind="package" name="acroread" epoch="0" ver="8.1.6" rel="0.1" flags="GE"/>
        </rpm:requires>
        <suse:freshens>
          <suse:entry kind="package" name="acroread"/>
        </suse:freshens>
      </format>
      <pkgfiles xmlns="http://novell.com/package/metadata/suse/patch">
        <deltarpm>
          <location href="rpm/i586/acroread-7.0.9_8.1.6-59_0.1.i586.delta.rpm"/>
          <checksum type="sha">09287424ad0588f33bced86d9945214aaf58c72a</checksum>
          <time file="1246444283" build="1246433748"/>
          <size package="42001591" archive="0"/>
          <base-version epoch="0" ver="7.0.9" rel="59" md5sum="7779706ef1a8fc7f94df8f48ae2aeeb7" buildtime="1190424605" sequence_info="acroread-7.0.9-59-fdfe79952cdd7665ff954a0ba3cc11feda5210"/>
        </deltarpm>
        <deltarpm>
          <location href="rpm/i586/acroread-8.1.5_8.1.6-0.1.i586.delta.rpm"/>
          <checksum type="sha">eebbff0f379eb7fa26b4e6119d017876f7eae07d</checksum>
          <time file="1246444324" build="1246433748"/>
          <size package="1925092" archive="0"/>
          <base-version epoch="0" ver="8.1.5" rel="0.1" md5sum="7c40870b2549ec346a1fdb56f71886cc" buildtime="1242744103" sequence_info="acroread-8.1.5-0.1-df795f080081b57cc177dc23e9f7890861ba32c139114111311122921b41c31f329821224212111111119951109f51ea210e98110c98110a98110898110f88110d88110c88110ff710ef710bf710bf41c310"/>
        </deltarpm>
      </pkgfiles>
    </package>
  </atoms>
</patch>
